First published: Fri Apr 02 2021(Updated: )
An issue was discovered in prog.cgi on D-Link DIR-878 1.30B08 devices. Because strcat is misused, there is a stack-based buffer overflow that does not require authentication.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-878 Firmware | <=1.30b08 | |
dlink DIR-878 firmware | =ax |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-30072 has a high severity rating due to the potential for unauthenticated remote exploitation.
To fix CVE-2021-30072, upgrade the D-Link DIR-878 device firmware to a version later than 1.30B08.
Yes, CVE-2021-30072 is exploitable remotely without the need for authentication.
CVE-2021-30072 affects D-Link DIR-878 devices with firmware version 1.30B08 and below.
CVE-2021-30072 is classified as a stack-based buffer overflow vulnerability.